atis-0x0000x  · web viewtechnical specification group services and system aspects; ip multimedia...

31
ATIS-10000XX ATIS Standard on Session Initiation Protocol (SIP) Resource- Priority Header (RPH) and Priority Header Signing in Support of Emergency Calling Alliance for Telecommunications Industry Solutions Approved Month DD, YYYY Abstract This standard defines how the IETF Personal Assertion Token (PASSporT) Extension for Resource-Priority Authorization [Ref 16], with the extensions defined in draft-ietf- stir-rph-emergency-services-07, Assertion Values for a Resource Priority Header Claim and a SIP Priority Header Claim in Support of Emergency Services Networks [Ref 7] and the associated STIR mechanisms, are used to sign the Session Initiation Protocol (SIP) Resource-Priority Header (RPH) header field and convey assertions of Resource-Priority associated with an emergency call or callback call. This standard also addresses the signing of the SIP Priority header field associated with callback calls. Specifically, this standard describes a procedure for providing cryptographic authentication and verification of the information in the SIP RPH header field and SIP Priority header 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31

Upload: others

Post on 23-Aug-2021

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: ATIS-0x0000x  · Web viewTechnical Specification Group Services and System Aspects; IP multimedia call control protocol based on Session Initiation Protocol (SIP) and Session Description

ATIS-10000XX

ATIS Standard on

Session Initiation Protocol (SIP) Resource-Priority Header (RPH) and Priority Header Signing in Support of Emergency

Calling

Alliance for Telecommunications Industry Solutions

Approved Month DD, YYYY

AbstractThis standard defines how the IETF Personal Assertion Token (PASSporT) Extension for Resource-Priority Authorization [Ref 16], with the extensions defined in draft-ietf-stir-rph-emergency-services-07, Assertion Values for a Resource Priority Header Claim and a SIP Priority Header Claim in Support of Emergency Services Networks [Ref 7] and the associated STIR mechanisms, are used to sign the Session Initiation Protocol (SIP) Resource-Priority Header (RPH) header field and convey assertions of Resource-Priority associated with an emergency call or callback call. This standard also addresses the signing of the SIP Priority header field associated with callback calls. Specifically, this standard describes a procedure for providing cryptographic authentication and verification of the information in the SIP RPH header field and SIP Priority header field in Internet Protocol (IP)-based service provider communication networks in support of emergency calling.

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

222324252627282930

31

Page 2: ATIS-0x0000x  · Web viewTechnical Specification Group Services and System Aspects; IP multimedia call control protocol based on Session Initiation Protocol (SIP) and Session Description

ATIS-10000XX

Foreword

The Alliance for Telecommunications Industry Solutions (ATIS) serves the public through improved understanding between carriers, customers, and manufacturers. The Packet Technologies and Systems Committee (PTSC) develops and recommends standards and technical reports related to services, architectures, and signaling, in addition to related subjects under consideration in other North American and international standards bodies. PTSC coordinates and develops standards and technical reports relevant to telecommunications networks in the U.S., reviews and prepares contributions on such matters for submission to U.S. International Telecommunication Union Telecommunication Sector (ITU-T) and U.S. ITU Radiocommunication Sector (ITU-R) Study Groups or other standards organizations, and reviews for acceptability or per contra the positions of other countries in related standards development and takes or recommends appropriate actions.

The SIP Forum is an IP communications industry association that engages in numerous activities that promote and advance SIP-based technology, such as the development of industry recommendations, the SIPit, SIPconnect-IT, and RTCWeb-it interoperability testing events, special workshops, educational seminars, and general promotion of SIP in the industry. The SIP Forum is also the producer of the annual SIP Network Operators Conference (SIPNOC), focused on the technical requirements of the service provider community. One of the Forum's notable technical activities is the development of the SIPconnect Technical Recommendation – a standards-based SIP trunking recommendation for direct IP peering and interoperability between IP Private Branch Exchanges (PBXs) and SIP-based service provider networks. Other important Forum initiatives include work in Video Relay Service (VRS) interoperability, security, Network-to-Network Interoperability (NNI), and SIP and IPv6.

Suggestions for improvement of this document are welcome. They should be sent to the Alliance for Telecommunications Industry Solutions, PTSC, 1200 G Street NW, Suite 500, Washington, DC 20005, and/or to the SIP Forum, 733 Turnpike Street, Suite 192, North Andover, MA, 01845.The mandatory requirements are designated by the word shall and recommendations by the word should. Where both a mandatory requirement and a recommendation are specified for the same criterion, the recommendation represents a goal currently identifiable as having distinct compatibility or performance advantages. The word may denotes an optional capability that could augment the standard. The standard is fully functional without the incorporation of this optional capability.The ATIS/SIP Forum IP-NNI Task Force under the ATIS Packet Technologies and Systems Committee (PTSC) and the SIP Forum Technical Working Group (TWG) was responsible for the development of this document.

ii

32

3334353637383940

414243444546474849

505152535455565758

59

60

Page 3: ATIS-0x0000x  · Web viewTechnical Specification Group Services and System Aspects; IP multimedia call control protocol based on Session Initiation Protocol (SIP) and Session Description

ATIS-10000XX

Table of ContentsScope & Purpose......................................................................................................................11

1.1 Scope.........................................................................................................................................111.2 Purpose........................................................................................................................................2

2 Normative References..........................................................................................................2

3 Definitions, Acronyms, & Abbreviations..............................................................................333.1 Definitions...................................................................................................................................333.2 Acronyms & Abbreviations.........................................................................................................33

4 Assumptions.......................................................................................................................554.1 General Assumptions.................................................................................................................554.2 Architectural Assumptions..........................................................................................................55

5 Overview.............................................................................................................................675.1 Protocol Support for SIP RPH and Priority header Signing of Emergency Calls and Callback Calls 77

5.1.1 RFC 8225: PASSporT: Personal Assertion Token............................................................................775.1.2 RFC 8224: Authenticated Identity Management in the Session Initiation Protocol (SIP)..................785.1.3 RFC 8443: Personal Assertion Token (PASSporT) Extension for Resource Priority Authorization. .885.1.4 Assertion Values for a Resource Priority Header Claim and Specification of SIP Priority Header Claim in Support of Emergency Services Networks........................................................................................88

5.2 Governance Model and Certificate Management.......................................................................995.3 Reference Architecture for SIP RPH and Priority Header Signing.............................................99

5.3.1 Reference Architecture for SIP RPH Signing Associated with Emergency (9-1-1) Originations......995.3.2 Reference Architecture for SIP RPH and Priority Header Signing Associated with Callback Calls

11115.4 SIP RPH Signing Call Flows for Emergency Calling..............................................................1212

5.4.1 SIP RPH Signing Call Flow for Emergency Originations...............................................................12125.4.2 SIP RPH and Priority Header Signing Call Flow for Callback Calls..............................................1414

6 Procedures for SIP RPH and Priority Header Signing....................................................16156.1 Procedures at the IBCF..........................................................................................................1616

6.1.1 Entry Point IBCF........................................................................................................................... 16166.1.2 Exit Point IBCF............................................................................................................................. 1716

6.2 Procedures at the STI-AS......................................................................................................17176.3 Procedures at the STI-VS......................................................................................................18176.4 Procedures at the P-CSCF.....................................................................................................18176.5 Procedures at the Transit Function........................................................................................1818

Table of Figures

Figure 1 Architecture for Signing SIP RPH of Emergency Originations....................................10Figure 2 Architecture for Signing SIP RPH of Callback Calls...................................................12Figure 3 Emergency Origination SIP RPH Signing Call Flow...................................................12Figure 4 Callback Call SIP RPH Signing Call Flow...................................................................14

iii

61

62

6364

65

66

6768

69

7071

72

737475767778798081828384858687

88

8990919293949596

97

98

99

100101102103104

Page 4: ATIS-0x0000x  · Web viewTechnical Specification Group Services and System Aspects; IP multimedia call control protocol based on Session Initiation Protocol (SIP) and Session Description

ATIS-10000XX

iv

105

Page 5: ATIS-0x0000x  · Web viewTechnical Specification Group Services and System Aspects; IP multimedia call control protocol based on Session Initiation Protocol (SIP) and Session Description

ATIS STANDARD ATIS-10000XX

ATIS Standard on –

Session Initiation Protocol (SIP) Resource-Priority Header (RPH) and Priority Header Signing in Support of Emergency Calling

1 Scope & Purpose1.1 ScopeAs specified in IETF RFC 4412, Communications Resource Priority for the Session Initiation Protocol (SIP) [Ref 8], the Session Initiation Protocol (SIP) Resource-Priority Header (RPH) field may be used by SIP user agents, including Public Switched Telephone Network (PSTN) gateways and terminals, and SIP proxy servers to influence prioritization afforded to communication sessions, including PSTN calls. As discussed in 3GPP TS 24.229, Technical Specification Group Services and System Aspects; IP multimedia call control protocol based on Session Initiation Protocol (SIP) and Session Description Protocol (SDP); Stage 3 [Ref 2], where the network has a requirement to prioritize emergency calls, it can use the "esnet" namespace in the Resource-Priority header field (as defined in IETF RFC 7135, Registering a SIP Resource Priority Header Field Namespace for Local Emergency Communications [Ref 11]) to do so. Where the Resource-Priority header field is used for this purpose, it is inserted by the entity identifying the emergency call, i.e., the Proxy Call Session Control Function (P-CSCF) or the Interconnection Border Control Function (IBCF). There is no usage of this namespace from the User Equipment (UE), and when this namespace is used, the trust domain implementation is set to remove it if it occurs from the UE.

After an emergency call is received by a Public Safety Answering Point (PSAP), it is sometimes necessary for the call taker to call the emergency caller back (e.g., if the caller disconnects prematurely). IETF RFC 7090, Public Safety Answering Point (PSAP) Callback [Ref 10], describes the use of the SIP Priority header field, with the value "psap-callback" to mark such calls to allow special network handling of the call, such as bypassing services that might preclude the call from completing. There is no protection against misuse of the SIP Priority field, and because, as IETF RFC 7090 [Ref 10] illustrates, the SIP Priority header field may affect routing, it is desirable to protect it from modification.

Like caller identity information associated with emergency calls and callback calls, the SIP RPH and Priority header fields could also be spoofed by unauthorized entities, impacting Public Safety communications and emergency response. Next Generation 9-1-1 (NG9-1-1) Emergency Services Networks receiving SIP RPHs across Internet Protocol Network-to-Network Interfaces (IP NNIs) from Internet Protocol (IP) originating networks cannot easily determine whether the SIP RPH was populated by an authorized Originating Service Provider or by an unauthorized entity. Likewise, the home network of an emergency caller cannot determine whether the SIP Priority header associated with a callback call was populated by an authorized party and can be trusted.

This ATIS standard leverages the Signature-based Handling of Asserted information using toKENs (SHAKEN) model specified in ATIS-1000074-E, Errata on ATIS Standard on Signature-based Handling of Asserted information using toKENs (SHAKEN) [Ref 5], to cryptographically sign and verify the SIP RPH and Priority header fields associated with emergency calls and callback calls using the Personal Assertion Token (PASSporT) extension defined in IETF RFC 8443, PASSporT Extension for Resource-Priority Authorization [Ref 16], with the assertion values described in draft-ietf-stir-rph-emergency-services-07, Assertion Values for a Resource Priority Header Claim and a SIP Priority Header Claim in Support of Emergency Services Networks [Ref 7], and the associated Secure Telephone Identity (STI) protocols described in 3GPP TS 24.229 [Ref 2]. Note that application of SIP RPH signing to emergency calls and SIP RPH and Priority header signing to callback calls is in addition to the caller identity authentication and verification defined in ATIS-1000074-E [Ref 5].

This ATIS standard is intended to provide a framework and guidance on how to use the PASSporT extension defined in IETF RFC 8443 [Ref 16], with the RPH assertion values and SIP Priority header claim specified in draft-ietf-stir-rph-emergency-services-07 [Ref 07] and the associated STI protocols to cryptographically sign and verify

1

1

106

107108109110111112113114115116117118119120

121122123124125126127

128129130131132133134

135136137138139140141142143144

145146147

Perspecta user, 04/08/21,
Inconsistent: sometime it's called RPH/Priority header
Page 6: ATIS-0x0000x  · Web viewTechnical Specification Group Services and System Aspects; IP multimedia call control protocol based on Session Initiation Protocol (SIP) and Session Description

ATIS-10000XXthe SIP RPH and Priority header values associated with emergency calls or callback calls that cross IP NNI boundaries.

The scope of this ATIS standard is limited to the cryptographic signing and verifying of SIP RPH and Priority header field contents associated with emergency and callback calls (i.e., RPH values in the “esnet” namespace and a Priority header value of “psap-callback”). This standard does not address caller identity authentication and verification associated with emergency calls and callback calls, except in the context of call flow descriptions, nor does it discuss specific impacts to call processing or routing procedures associated with the use of the Priority header to mark callback calls. The display of information associated with the verification of SIP RPH and Priority header values is also outside the scope of this document.

1.2 PurposeIllegitimate spoofing of SIP RPH values in the “esnet” namespace in the signaling associated with emergency calls and callback calls is a concern for Public Safety. NG9-1-1 System Service Providers will interconnect with multiple Originating Service Providers and will benefit from knowing whether the SIP RPH value received in incoming signaling can be trusted. Likewise, home network providers serving emergency callers will benefit from knowing whether the Priority header accompanying a callback call can be trusted before applying special processing or routing to such calls. The purpose of this standard is to provide a framework for cryptographically signing the SIP RPH and Priority header fields and verifying that the SIP RPH and Priority header fields can be trusted to mitigate against unauthorized spoofing or tampering of the information conveyed in the SIP RPH or Priority header. This framework will leverage the SHAKEN infrastructure for caller identity authentication and verification and will describe how the PASSporT rph extension defined in IETF RFC 8443 [Ref 16], with the RPH assertion values and SIP Priority header claim described in draft-ietf-stir-rph-emergency-services-07 [Ref 7], can be used for the purpose of providing a trust mechanism for the SIP RPH associated with emergency calls and the SIP RPH and Priority header associated with callback calls that cross IP NNI boundaries.

2 Normative ReferencesThe following standards contain provisions which, through reference in this text, constitute provisions of this ATIS Standard. At the time of publication, the editions indicated were valid. All standards are subject to revision, and parties to agreements based on this Standard are encouraged to investigate the possibility of applying the most recent editions of the standards indicated below.

Editor’s Note: the draft RFCs below will be changed to the normative RFC numbers when available from IETF.

[Ref 1] 3GPP TS 23.228, 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; IP Multimedia Subsystem (IMS); Stage 2.3.1

[Ref 2] 3GPP TS 24.229, Technical Specification Group Services and System Aspects; IP multimedia call control protocol based on Session Initiation Protocol (SIP) and Session Description Protocol (SDP); Stage 3. 1

[Ref 3] ATIS-0500032, ATIS Standard for Implementation of an IMS-based NG9-1-1 Service Architecture.2

[Ref 4] ATIS-0700015.v004, ATIS Standard for Implementation of 3GPP Common IMS Emergency Procedures for IMS Origination and ESInet/Legacy Selective Router Termination.2

[Ref 5] ATIS-1000074-E, Errata on ATIS Standard on Signature-based Handling of Asserted information using toKENs (SHAKEN). 2

[Ref 6] ATIS-1000082, Technical Report on SHAKEN APIs for a Centralized and Signature Validation Server.2

[Ref 7] draft-ietf-stir-rph-emergency-services-07, Assertion Values for a Resource Priority Header Claim and a SIP Priority Header Claim in Support of Emergency Services Networks.3

[Ref 8] IETF RFC 4412, Communications Resource Priority for the Session Initiation Protocol (SIP).3

1 This document is available from the Third Generation Partnership Project (3GPP) at: < http://www.3gpp.org/specs/specs.htm >. 2 This document is available from the Alliance for Telecommunications Industry Solutions (ATIS) at: < https://www.atis.org/ >.3 This document is available from the Internet Engineering Task Force (IETF) at: < https://www.ietf.org/ >.

2

148149

150151152153154155156

157

158159160161162163164165166167168169170171

172

173

174175176177

178

179180

181182

183

184185

186187

188

189190

191

23

4

5

Page 7: ATIS-0x0000x  · Web viewTechnical Specification Group Services and System Aspects; IP multimedia call control protocol based on Session Initiation Protocol (SIP) and Session Description

ATIS-10000XX[Ref 9] IETF RFC 5280, Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile.3

[Ref 10] IETF RFC 7090, Public Safety Answering Point (PSAP) Callback.3

[Ref 11] IETF RFC 7135, Registering a SIP Resource Priority Header Field Namespace for Local Emergency Communications.3

[Ref 12] IETF RFC 7230, Hypertext Transfer Protocol (HTTP/1.1): Message Syntax and Routing.3

[Ref 13] IETF RFC 8224, Authenticated Identity Management in the Session Initiation Protocol.3

[Ref 14] IETF RFC 8225, PASSporT: Personal Assertion Token.3

[Ref 15] IETF RFC 8226, Secure Telephone Identity Credentials: Certificates.3

[Ref 16] IETF RFC 8443, PASSporT Extension for Resource-Priority Authorization.3

3 Definitions, Acronyms, & AbbreviationsFor a list of common communications terms and definitions, please visit the ATIS Telecom Glossary, which is located at < http://www.atis.org/glossary >.

3.1 DefinitionsCallback Call: A request whose purpose is to reconnect with the party that originated an emergency call.

Emergency Call: A generic term used to include any type of Request For Emergency Assistance. In North America, the 3-digit code “9-1-1” is typically used to facilitate the reporting of an emergency requiring response by a Public Safety agency.

Next Generation 9-1-1 (NG9-1-1): An IP-based system comprised of managed IP-based networks (e.g., ESInets), functional elements (applications), and databases that replicate traditional E9-1-1 features and functions, and provide additional capabilities. NG9-1-1 is designed to provide access to emergency services from all connected communications sources, and provide multimedia data capabilities for Public Safety Answering Points (PSAPs) and other emergency service organizations.

Resource-Priority Header (RPH): A SIP header field that may be used by SIP user agents, including Public Switched Telephone Network (PSTN) gateways and terminals, and SIP proxy servers to influence their treatment of SIP requests, including the priority afforded to PSTN calls.

Priority Header: A SIP header field that is used to mark callback calls to increase the chances of reaching the emergency caller by allowing networks to use that marking to apply preferential treatment to those calls. See IETF RFC 7090 [Ref 10] for further details.

3.2 Acronyms & Abbreviations3GPP 3rd Generation Partnership Project

ATIS Alliance for Telecommunications Industry Solutions

CRL Certificate Revocation List

CSCF Call Session Control Function

CVT Call Validation Treatment

E-CSCF Emergency Call Session Control Function

ESInet Emergency Services IP Network

ESRP Emergency Service Routing Proxy

3

192193

194

195196

197

198

199

200

201

202

203

204205

206

207208

209210211

212213214215216

217218219

220221222

223

224

Page 8: ATIS-0x0000x  · Web viewTechnical Specification Group Services and System Aspects; IP multimedia call control protocol based on Session Initiation Protocol (SIP) and Session Description

ATIS-10000XX

HTTP Hypertext Transfer Protocol

HTTPS Hypertext Transfer Protocol Secure

IBCF Interconnection Border Control Function

I-CSCF Interrogating Call Session Control Function

IETF Internet Engineering Task Force

IMS IP Multimedia Subsystem

IP Internet Protocol

IP NNI Internet Protocol Network-to-Network Interface

JSON JavaScript Object Notation

LRF Location Retrieval Function

NG9-1-1 Next Generation 9-1-1

NNI Network-to-Network Interface

PASSporT Personal Assertion Token

P-CSCF Proxy Call Session Control Function

PSAP Public Safety Answering Point

PSTN Public Switched Telephone Network

RDF Routing Determination Function

RPH Resource-Priority Header

SHAKEN Signature-based Handling of Asserted information using toKENs

SIP Session Initiation Protocol

SKS Secure Key Store

STI Secure Telephone Identity

STI-AS Secure Telephone Identity Authentication Service

STI-CA Secure Telephone Identity Certification Authority

STI-CR Secure Telephone Identity Certificate Repository

STI-VS Secure Telephone Identity Verification Service

STIR Secure Telephone Identity Revisited

TN Telephone Number

UA User Agent

UE User Equipment

URI Uniform Resource Identifier

4

225

Page 9: ATIS-0x0000x  · Web viewTechnical Specification Group Services and System Aspects; IP multimedia call control protocol based on Session Initiation Protocol (SIP) and Session Description

ATIS-10000XX

4 Assumptions

4.1 General AssumptionsThis standard makes the following assumptions regarding the application of RPH signing to emergency calls and callback calls:

1. A Resource-Priority Header (RPH) in the ‘esnet’ namespace may or may not be associated with an emergency origination by the P-CSCF in the originating IMS network, based on local policy.

2. Caller identity assertion/authentication and/or RPH signing will be performed by the originating network after it has been determined that the emergency call is to be routed to an NG9-1-1 Emergency Services Network.

3. The NG9-1-1 Emergency Services Network will be responsible for performing verification of PASSporT information received with an emergency call.

4. Callback calls routed via the NG9-1-1 Emergency Services Network will be marked as “psap-callback” and will contain an RPH with a value of “esnet.0”.

5. The NG9-1-1 Emergency Services Network will be responsible for performing caller identity attestation/authentication and RPH and SIP Priority header signing on callback calls.

6. Verification of a signed caller identity/RPH/Priority header will be performed by the terminating home network for the callback call.

7. A Service Provider can use the same Secure Telephone Identity (STI) certificates for signing SIP RPH/Priority header as they use for telephone number (TN) signing, but is not required to do so.

8. SIP RPH signing does not change or modify 9-1-1/callback call processing, signaling and routing procedures; it simply provides a security tool for transit and receiving providers to determine if the SIP RPH is trusted.

9. If validation of the signed caller identity or SIP RPH associated with a 9-1-1 origination fails, the 9-1-1 call will be delivered to the PSAP with caller identity and SIP RPH, as well as the results of the caller identity and RPH verification.

NOTE: The mechanism to convey RPH/SIP Priority header signing verification success/failure via ‘verstat’ in a SIP INVITE message is for further study.

10. If validation of the signed caller identity or SIP RPH/Priority header associated with a callback call fails, terminating Service Provider local policy will determine terminating call processing, such as whether the call should be delivered with caller identity and/or SIP RPH/Priority header information intact. Note that if the call proceeds, a ‘verstat’ parameter will be included in the associated SIP signaling.

11. Signing of caller identity is separate from SIP RPH/Priority header signing. Separate SIP Identity headers are used for SIP RPH/Priority header signing and caller identity signing.

4.2 Architectural AssumptionsIn keeping with the SHAKEN reference architecture described in ATIS-1000074-E [Ref 5], which shows a Call Session Control Function (CSCF) interacting with a Secure Telephone Identity Authentication Service (STI-AS) (in the originating network) and a Secure Telephone Identity Verification Service (STI-VS) (in the terminating network), initial discussions related to the architecture to support the application of SHAKEN to 9-1-1 assumed that, for 9-1-1 originations, the Emergency Call Session Control Function (E-CSCF) in the originating IMS network would interact with the STI-AS, and an E-CSCF (in an IMS-based NG9-1-1 Emergency Services Network) or an i3 Emergency Service Routing Proxy (ESRP) (in an i3 NG9-1-1 Emergency Services Network) would interact with the STI-VS. However, there is currently no reference point defined in 3GPP standards that supports interactions between an E-CSCF and an Application Server. 3GPP TS 23.228, 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; IP Multimedia Subsystem (IMS); Stage 2.3 [Ref 1], and 3GPP TS 24.229 [Ref 2] do, however, describe the use of the Ms reference point between an IBCF and an Application Server over which HTTP 1.1, as specified in IETF RFC 7230, Hypertext Transfer Protocol (HTTP/1.1): Message Syntax and Routing [Ref 12], is currently defined. Specifically, Annex V of 3GPP TS 24.229 [Ref 2] defines a signingRequest/signingResponse and verificationRequest/verificationResponse to support caller identity signing and verification. Note that this mechanism is also supported by ATIS-1000082, Technical Report on SHAKEN APIs for a Centralized and Signature Validation Server [Ref 6], where the egress exit IBCF in the originating

5

226

227

228229230

231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261

262263264265266267268269270271272273274275276277278

Perspecta user, 04/08/21,
Suggest making two separate assumptions, one for RPH, one for Caller ID. The verstat and handling might be different for each. Same comment for step 9.
Moresco, Thomas V, 05/05/21,
Delete blank line149
Page 10: ATIS-0x0000x  · Web viewTechnical Specification Group Services and System Aspects; IP multimedia call control protocol based on Session Initiation Protocol (SIP) and Session Description

ATIS-10000XXnetwork is the “Authenticator” and the ingressentry IBCF in the IMS NG9-1-1 Emergency Services Network is the “Verifier”.

Based on 3GPP TS 24.229 [Ref 2] and ATIS-1000082 [Ref 6], to get an asserted identity signed, the client sends an HTTP POST request towards the signing server containing a PASSporT SHAKEN object. As currently defined, the signingRequest includes “orig” and “dest” claims, iat, and origid. The signingRequest may also include an “attest” parameter that identifies the relation between the service provider attesting the identity and the subscriber. (According to 3GPP TS 24.229 [Ref 2], the signingRequest may also include a “div” claim identifying the diverting user, if applicable.) The ability for an IBCF to include this information in a signingRequest sent to an STI-AS has other architectural implications. Specifically, it suggests the need for an upstream element, such as a P-CSCF, in the case of an emergency origination, to provide attestation information associated with the caller identity, and to convey the attestation level in the SIP signaling (e.g., in an Attestation-Info header) sent to an exit IBCF. According to 3GPP TS 24.229 [Ref 2] and ATIS-1000082 [Ref 6], upon receiving an HTTP 200 (OK) response to the signingRequest, the IBCF (Authenticator) will include the value of the "identity" claim in an Identity header field in the forwarded SIP request. This model differs from the framework architecture example described in ATIS-1000074-E [Ref 5], where the SIP INVITE is forwarded by a CSCF to the STI-AS and the STI-AS is responsible for attestation, as well as creating and adding an Identity header field to the request. The reference architecture described in Clause 5.3.1 and flow described in Clause 5.4.1 of this standard illustrate the use of the Ms reference point to support caller identity as well as RPH signing associated with emergency originations. The IBCF procedures described in Clause 6.1 of this standard also assume the use of the Ms reference point between the IBCF and the STI-AS/STI-VS to support caller identity and RPH signing/verification.

The architecture described in this document to support the application of SHAKEN procedures to callback calls assumes that multimedia callback calls are routed via a Transit Function in an IMS NG9-1-1 Emergency Services Network. The Transit Function is assumed to interact with the STI-AS to support caller identity authentication and signing, as well as RPH/SIP Priority header signing. The Transit Function will invoke the STI-AS for callback calls presented to it after call processing has completed, that is, after the destination interconnected network has been determined. The STI-AS is responsible for asserting/signing the telephone identity of the caller (i.e., the PSAP originating the callback call), as well as the RPH/SIP Priority header values included in the SIP INVITE message associated with the callback call. The STI-AS will return two SIP Identity header fields (one associated with the caller identity and one associated with the RPH/SIP Priority header) to the Transit Function, constructed per IETF RFC 8224, Authenticated Identity Management in the Session Initiation Protocol [Ref 13]. The Transit Function will include the Identity headers in outgoing signaling and route the callback call toward the home network of the emergency caller. (See ATIS-0500032, ATIS Standard for Implementation of an IMS-based NG9-1-1 Service Architecture [Ref 3], for further details related to the processing of callback calls within an IMS NG9-1-1 Emergency Services Network.)

The callback architecture described in this document also assumes that an entry IBCF in the emergency caller’s home network will interact with the STI-VS to support verification of the signed caller identity and RPH/SIP Priority header. As further assumed and described in Clause 6.1.1, the entry point IBCF in the emergency caller’s home network will build and send a verificationRequest to the STI-VS over the Ms reference point in an HTTP POST message. The STI-VS will respond by returning a verificationResponse in an HTTP 200 (OK) message that contains “verstatValue” parameters reflecting the verification status of the Identity header associated with calling identity and the Identity header associated with the RPH/SIP Priority header. The IBCF will include the ‘verstat’ information in the SIP signaling sent towards the emergency caller.

While this document assumes an architecture that uses the Ms reference point to support the application of SHAKEN authentication and verification to 9-1-1 originations and callback calls, other architectures are possible.

5 OverviewIn addition to caller identity authentication/verification, 9-1-1 calls and callback calls may also be subject to Resource-Priority Header (RPH)RPH signing and, in the case of callback calls, SIP Priority header signing. In the context of 9-1-1 calls, a signed RPH received in an incoming SIP INVITE message will convey to an NG9-1-1 Emergency Services Network provider that they can trust that the RPH was populated by the originating service provider, as opposed to being inserted by a threat agent. In the context of callback calls, a signed RPH and SIP Priority header would indicate that the NG9-1-1 Emergency Services Network provider asserts that they recognize the call is a callback call and, as such, that an RPH value in the ‘esnet’ namespace and a SIP Priority header with the value “psap-callback” are appropriate. The SHAKEN model specified in ATIS-1000074-E [Ref 5] can be

6

279280

281282283284285286287288289290291292293294295296297298

299300301302303304305306307308309310311312

313314315316317318319320

321322

323

324

325326327328329330331332

Perspecta user, 04/08/21,
Have defined RPH twice already.
Perspecta user, 04/08/21,
Add another FFS vis a vis lines147-148?
Page 11: ATIS-0x0000x  · Web viewTechnical Specification Group Services and System Aspects; IP multimedia call control protocol based on Session Initiation Protocol (SIP) and Session Description

ATIS-10000XXleveraged to cryptographically sign and verify the SIP RPH field in SIP INVITE messages associated with 9-1-1 and callback calls and the SIP Priority header associated with callback calls. Using the PASSporT extension defined in IETF RFC 8443 [Ref 16], the RPH assertion values and SIP Priority header claim described in draft-ietf-stir-rph-emergency-services-07 [Ref 7] and the associated STI protocols, SIP RPH and Priority header field contents can be signed and verified.

The framework specified in this standard supports a trust mechanism for SIP RPH values associated with emergency calls and callback calls, and SIP Priority header values associated with callback calls, crossing IP NNI boundaries. A high-level description of the RPH/SIP Priority header signing flow supported by the framework specified in this standard is as follows:

For emergency calls:

1. The Originating Service Provider cryptographically signs the SIP RPH if present in the SIP INVITE associated with an emergency (9-1-1) origination before sending the call across an IP NNI boundary.

2. The NG9-1-1 System Service Provider verifies the received signed PASSporT for the SIP RPH.For callback calls:

1. The NG9-1-1 System Service Provider cryptographically signs the SIP RPH and Priority headers (unless a signed RPH and Priority header are received in the SIP INVITE associated with the callback call from the PSAP) before sending the call across an IP NNI boundary to/towards the emergency caller’s home network.

2. The emergency caller’s home Service Provider verifies the received signed PASSporT for the SIP RPH/Priority header.

[5.1] Protocol Support for SIP RPH and Priority header Signing of Emergency Calls and Callback Calls

This ATIS standard uses the PASSporT “rph” extension specified in IETF RFC 8443 [Ref 16], the RPH assertion values described in draft-ietf-stir-rph-emergency-services-07 [Ref 7], and associated STI protocols for cryptographic signing of the SIP RPH field in support of emergency service calls. Similarly, this ATIS standard uses the PASSporT “rph” extension specified in IETF RFC 8443 [Ref 16], the RPH assertion values and SIP Priority header claim described in draft-ietf-stir-rph-emergency-services-07 [Ref 7], and associated STI protocols for cryptographic signing of the SIP RPH/Priority header fields in support of callback calls.

5.1.1 RFC 8225: PASSporT: Personal Assertion TokenIETF RFC 8225, PASSporT: Personal Assertion Token [Ref 14], defines a token-based signature that combines the use of JavaScript Object Notation (JSON) Web Tokens, JSON Web Signatures, and X.509 certificate key pairs, or Public Key Infrastructure, to create a trusted signature. The authorized owner of the certificate used to generate the signature can be validated and traced back to the known trust anchor who signed the certificate. The PASSporT includes a number of claims the signer of the token is asserting. The associated public certificate is used to verify the digital signature and the claims included in the PASSporT. The public certificate is also used to validate the entity that signed the token, as defined in IETF RFC 8226, Secure Telephone Identity Credentials: Certificates [Ref 15]. The validated claims and the validated identity of the entity signing the claims can both be used to determine the level of trust in the originating entity and their asserted SIP RPH information.

5.1.2 RFC 8224: Authenticated Identity Management in the Session Initiation Protocol (SIP)

IETF RFC 8224 [Ref 13] defines a SIP-based framework for an authentication service and verification service for using the PASSporT signature in a SIP INVITE. It defines a new Identity header field that delivers the PASSporT signature and other associated parameters. The authentication service adds the Identity header field and signature to the SIP INVITE generated by the originating provider.4 The SIP INVITE is delivered to the destination

4 Note that when using the Ms reference point defined in 3GPP TS 24.229 [Ref 2] to interact with the authentication service, the authentication service will return identityHeader parameter(s) in the signingResponse and the element that sent the

7

333334335336337

338339340341

342

343344345346347

348349350351352353354

355

356357358359360361362

363

364365366367368369370371372373

374

375376377378379380

67

Perspecta user, 04/08/21,
Shorter titles are a matter of preference.
Page 12: ATIS-0x0000x  · Web viewTechnical Specification Group Services and System Aspects; IP multimedia call control protocol based on Session Initiation Protocol (SIP) and Session Description

ATIS-10000XXprovider, which uses the verification service, to verify the signature using the identity in the P-Asserted-Identity header field or From header field.

5.1.3 RFC 8443: Personal Assertion Token (PASSporT) Extension for Resource Priority Authorization

IETF RFC 8443 [Ref 16] defines an optional extension to the PASSporT and the associated STI mechanisms to support the signing of the SIP 'Resource-Priority' header field. It extends the PASSporT to allow cryptographic signing of the SIP 'Resource-Priority’ header field which is used for communications resource prioritization. It also describes how the PASSPorT extension is used in SIP signaling to convey assertions of authorization of the information in the SIP 'Resource-Priority' header field.

Specifically, assertion of the information in the RPH includes a “ppt” extension with an “rph” claim in the PASSporT. Based on IETF RFC 8443 [Ref 16], a PASSporT header with the "ppt" extension will consist of the following information:

{

"typ":"passport",

"ppt":"rph",

"alg":"ES256",

"x5u":"https://www.example.org/cert.cer"

}

According to IETF RFC 8443 [Ref 16], the "rph" claim will provide an assertion of authorization for the information in the SIP RPH. In the context of emergency calls and callback calls, the “rph” claim will provide an assertion of the value of the SIP RPH. Specifically, the "rph" claim includes an assertion of the priority level to be used for a given communication session.

[5.1.4] Assertion Values for a Resource Priority Header Claim and Specification of SIP Priority Header Claim in Support of Emergency Services Networks

draft-ietf-stir-rph-emergency-services-07 [Ref 7] adds new assertion values for the Resource Priority Header ("rph") claim defined in IETF RFC 8443 [Ref 16] to support Emergency Services Networks for emergency call origination and callback.

The following is an example of an "rph" claim for a SIP 'Resource-Priority' header field with an “esnet.1” assertion to be used with an emergency (9-1-1) origination:

{ "dest":{"uri":["urn:service:sos"]}, "iat":1443208345,

"orig":{"tn":"12155551212"}, "rph":{"auth":["esnet.1"]}}

In addition, draft-ietf-stir-emergency-services-07 [Ref 7] defines a new SIP Priority Header header claim ("sph") for protection of the "psap-callback" value as part of the "rph" PASSporT extension to support the security of Emergency Services Networks for emergency callbacks. The “sph” claim shall only be used for authorized emergency callbacks and corresponds to a SIP Priority header field with the value "psap-callback”. For emergency callbacks, the "orig" claim of the "rph" PASSporT represents the PSAP telephone number. The "dest" claim contains the telephone number representing the emergency caller that is being called back. The following is an example of an "rph" claim for a SIP 'Resource-Priority' header field with an "esnet.0" assertion and an “sph” claim:

signingRequest (i.e., the IBCF) will be responsible for populating the Identity headers in the outgoing SIP INVITE message.8

381382

383

384385386387388389390

391392393

394

395

396

397

398

399

400401402403

404

405406407408409

410411

412413414415416417418

419420421422423424425426

8

Perspecta user, 04/08/21,
Why dissimilar from RPH header field"?
Page 13: ATIS-0x0000x  · Web viewTechnical Specification Group Services and System Aspects; IP multimedia call control protocol based on Session Initiation Protocol (SIP) and Session Description

ATIS-10000XX { "dest":{"tn":["12155551212"]}, "iat":1443208345,

"orig":{"tn":"12155551213"}, "rph":{"auth":["esnet.0"]}

"sph":"psap-callback" }

After the PASSporT header and claims have been constructed, their signature is generated normally per the guidance in IETF RFC 8225 [Ref 14] using the full form of PASSporT.

5.2 Governance Model and Certificate ManagementThe credentials (i.e., the STI certificate) used to create the signature must shall have authority over the namespace of the "rph" claim and the content of the “sph” claim. There is only one authority per claim. The authority shall use its credentials associated with the specific service supported by the resource priority namespace in the claim.

The governance model and the management of the credentials used by Originating Service Providers (for emergency originations) and NG9-1-1 System Service Providers (for callback calls) for cryptographic signing of the SIP RPH and Priority header are not within the scope of this standard.

[5.3] Reference Architecture for SIP RPH and Priority Header Signing[5.3.1] Reference Architecture for SIP RPH Signing Associated with Emergency (9-1-1)

OriginationsFigure 5-1 shows a reference architecture for SIP RPH signing in the context of emergency originations. The architecture used for signing the SIP RPH associated with emergency originations builds on the calling number authentication/verification architecture supported by 3GPP TS 24.229 [Ref 2] and 3GPP TS 23.228 [Ref 1] in which an IBCF in an originating network, if configured through operator policies, invokes an Application Server via the Ms reference point for the signing of identity information, if available, in an incoming request. The IBCF then includes the signed information in the outgoing request. In Figure 5-1, the emergency call is originated from Originating Service Provider A’s network that performs the authentication service and is terminated in NG9-1-1 Emergency Services Network Provider 1’s network, which performs the verification service.

As described in Clause V.2.1 of 3GPP TS 24.229 [Ref 2], the Ms reference point is used to request the signing of an Identity header field or to request verification of a signed identity in an Identity header field. The currently defined protocol to be used on the Ms Reference Point is HTTP 1.1, as specified in IETF RFC 7230 [Ref 12].

9

427428429430431432433434

435436

437

438439440441442

443444445

446

447

448449450451452453454455456457

458459460

461

462

Perspecta user, 04/08/21,
Should this be a shall?
Page 14: ATIS-0x0000x  · Web viewTechnical Specification Group Services and System Aspects; IP multimedia call control protocol based on Session Initiation Protocol (SIP) and Session Description

ATIS-10000XX

Figure 5-1: Architecture for Signing SIP RPH of Emergency Originations

The reference architecture illustrated in Figure 5-1 includes the following elements:

IMS Elements: SIP User Agent (SIP UA) – This component represents the originating end point for an emergency

origination. Proxy Session Control Function (P-CSCF) – This component receives the emergency session

establishment request from the UE, detects that it is an emergency session request, and forwards it to/towards the E-CSCF.

NOTE: As specified in 3GPP TS 24.229 [Ref 2] and ATIS-0700015, ATIS Standard for Implementation of 3GPP Common IMS Emergency Procedures for IMS Origination and ESInet/Legacy Selective Router Termination [Ref 4], if required by operator policy, the P-CSCF may forward the emergency session establishment request to the E-CSCF via an S-CSCF.

Emergency Call Session Control Function (E-CSCF) – In the context of an originating IMS network, the E-CSCF receives the emergency session establishment request from the P-CSCF, obtains location information, obtains routing information, and forwards the emergency session establishment request per the routing information. In the context of an NG9-1-1 Emergency Services Network, the E-CSCF receives the emergency session establishment request from the I-CSCF, queries the LRF for routing information, and then forwards the call request towards the appropriate PSAP per the routing information. After initial call routing to the appropriate PSAP, the E-CSCF may or may not remain in the call path per implementation.

Location Retrieval Function (LRF) - The LRF obtains location information for a UE and uses that location to acquire routing information for an emergency session from the Routing Determination Function (RDF).

Routing Determination Function (RDF) - This functional entity, which may be integrated in a Location Server or in an LRF, provides routing information for an emergency session to the E-CSCF.

Interconnection Border Control Function (IBCF) – This function is at the edge of the service provider network and represents the Network-to-Network Interface (NNI) or peering interconnection point between telephone service providers. It is the ingress entry and egress exit point for SIP calls between providers.

Interrogating Call Session Control Function (I-CSCF) – This component receives emergency call requests from the entry IBCF in an NG9-1-1 Emergency Services Network. The I-CSCF forwards the emergency call request to the provisioned (or pre-configured) E-CSCF in the NG9-1-1 Emergency Services Network.

SHAKEN Elements Secure Telephone Identity Authentication Service (STI-AS) – Defined in ATIS-1000074-E [Ref 5] as an

application server that performs the function of the authentication service defined in IETF RFC 8224 [Ref 13]. In the context of this standard, the STI-AS contains a logical component that provides the authentication service for the SIP RPH signing defined in IETF RFC 8443 [Ref 16].

Secure Telephone Identity Verification Service (STI-VS) – Defined in ATIS-1000074-E [Ref 5] as an application server that performs the function of the verification service defined in IETF RFC 8224 [Ref 13].

10

463464

465

466

467

468469470471472473474475476477478479480481482483484485486487488489490491492493494495

496

497

498499500501502503

Perspecta user, 04/08/21,
It's a given that an element can be logical or physical depending on the implementation.
Page 15: ATIS-0x0000x  · Web viewTechnical Specification Group Services and System Aspects; IP multimedia call control protocol based on Session Initiation Protocol (SIP) and Session Description

ATIS-10000XXIn the context of this standard, the STI-VS contains a logical component that provides the verification service for the SIP RPH signing defined in IETF RFC 8443 [Ref 16].

Call Validation Treatment (CVT) – Defined in ATIS-1000074-E [Ref 5] as a logical function that could be an application server function or a third party application for applying anti-spoofing mitigation techniques once the caller identity signature, if available, is positively or negatively verified.

Secure Key Store (SKS) – Defined in ATIS-1000074-E [Ref 5] as a highly secure logical element that stores secret private key(s) for the STI-AS to access. (Any element that accesses the key store (i.e., STI-AS) should also be highly secure.)

Certificate Provisioning Service – Defined in ATIS-1000074-E [Ref 5] as a logical service used to provision certificate(s) used for STI.

Secure Telephone Identity Certificate Repository (STI-CR) – Defined in ATIS-1000074-E [Ref 5] as a publicly accessible store for public key certificates.

Public Safety Elements i3 Public Safety Answering Point (PSAP) – A PSAP is an entity responsible for receiving emergency

(9-1-1) calls and processing those calls according to a specific operational policy. An i3 PSAP is a SIP end point (client) that is capable of receiving IP-based signaling and media associated with emergency calls in a manner conformant with NENA i3 standards.

[5.3.2] Reference Architecture for SIP RPH and Priority Header Signing Associated with Callback Calls

Figure 5-2 shows a reference architecture for SIP RPH and Priority header signing in the context of callback calls. The architecture used for signing the SIP RPH and Priority header associated with callback calls assumes that a Transit Function in an IMS NG9-1-1 Emergency Services Network, if configured through operator policies, invokes caller identity authentication and RPH/SIP Priority header signing by passing the SIP INVITE message associated with the callback call via the Mf reference point to the STI-AS. Specifically, a Transit Function processing a SIP INVITE associated with a callback call will interact with the STI-AS to assert the telephone identity of the caller (i.e., a P-Asserted-Identity header field containing sip:TN@<psapdomain>;user=phone, where the TN is associated with the PSAP originating the callback call) and to request signing of the RPH value (i.e., “esnet.0”) and the SIP Priority header value (i.e., “psap-callback”) included in the SIP INVITE message associated with the callback call. The Transit Function will invoke the STI-AS for callback calls presented to it after call processing has completed, that is, after the target interconnected network has been determined.

Once the assertion and signing process is completed, the Transit Function will receive the SIP INVITE back from the STI-AS with two added SIP Identity header fields constructed per IETF RFC 8224 [Ref 13], one associated with the caller identity and one associated with the RPH/SIP Priority header, using the IMS-based NG9-1-1 Emergency Services Network provider’s credentials as the signing authority for the PSAP telephone identity and RPH/SIP Priority header.

After receiving the SIP INVITE from the STI-AS, the Transit Function will route the call to the exit IBCF. The exit IBCF will then route the call over the NNI through the standard inter-domain routing configuration towards the entry IBCF associated with the emergency caller’s home network. The home network will perform STI verification, assuming it supports such capabilities, and presents the called party (i.e., the emergency caller) with an indication of the verification status of the caller identity and RPH/SIP Priority header.

Note that an alternative callback architecture will have the exit point IBCF in the NG9-1-1 Emergency Services Network interact with the STI-AS via the Ms reference point, using the HTTP interface described in Annex V of 3GPP TS 24.229 [Ref 2]. See ATIS-0500032 [Ref 3] for further details. An alternative callback architecture will allow the CSCF in the emergency caller’s home network to interact with the STI-VS using SIP, rather than having the IBCF interact with the STI-VS using HTTP (as illustrated below).

11

504505506507508509510511512513514515

516

517

518519520521522

523524525526527528529530531532533534535

536537538539540

541542543544545

546547548549550

551

552

Moresco, Thomas V, 05/05/21,
Alternative to Transit Function not being configured?
Page 16: ATIS-0x0000x  · Web viewTechnical Specification Group Services and System Aspects; IP multimedia call control protocol based on Session Initiation Protocol (SIP) and Session Description

ATIS-10000XX

Figure 5-2: Architecture for Signing SIP RPH of Callback Calls

In addition to the elements described in Clause 5.3.1, the reference architecture illustrated in Figure 5-2 includes the following IMS element:

Transit Function – As described in 3GPP TS 23.228 [Ref 1], a Transit Function is an element that determines where to route a session based on an analysis of the destination address. This includes routing to destinations in other IMS networks or the PSTN. In the context of the emergency calling, the Transit Function will be used to support multimedia callbacks.

[5.4] SIP RPH Signing Call Flows for Emergency Calling[5.4.1] SIP RPH Signing Call Flow for Emergency (9-1-1) OriginationsThis call flow description is based on the reference architecture illustrated in Figure 5-1.

Figure 5-3: Emergency Origination SIP RPH Signing Call Flow

1. The originating SIP UA, which first registers and is authenticated to the P-CSCF, creates a SIP INVITE with a telephone number identity.

2. The P-CSCF in the originating network adds a P-Asserted-Identity header field asserting the caller identity of the originating SIP UA, and an RPH with value “esnet.1”. If supported by local policy, the P-CSCF will also insert a ‘verstat’ parameter in the P-Asserted-Identity header, and optional Attestation-Info and Origination-Id header fields.

3. The E-CSCF sends the SIP INVITE to the LRF to determine routing instructions.4. The LRF acquires location, if required, and queries the RDF for the routing URI. 5. The LRF returns the routing URI to the E-CSCF.6. If the emergency call is to be routed to an NG9-1-1 Emergency Services Network, the E-CSCF

forwards the emergency call to the exit IBCF.

12

553554

555

556557

558559560561562

563

564

565

566

567568

569

570571572573574575576577578579580

Page 17: ATIS-0x0000x  · Web viewTechnical Specification Group Services and System Aspects; IP multimedia call control protocol based on Session Initiation Protocol (SIP) and Session Description

ATIS-10000XX7. The exit IBCF sends an HTTP POST message containing two signing requests over the Ms reference

point to the STI-AS. a. The signingRequest associated with the caller identity includes an “attest” parameter that

contains the attestation information and an “origid” parameter, as well as other PASSporT information (i.e., “orig”, “dest”, and iat). The “attest” parameter and the “origid” parameter are either populated according to local policy, or based on information received by the IBCF in the Attestation-Info header and Origination-Id header within the SIP INVITE.

b. The signingRequest associated with the RPH includes an “rph” claim that contains an ”auth” key that asserts the value “esnet.1”, along with the “orig”, “dest”, and “iat”.5 The IBCF will populate the assertion value in the signingRequest based on the RPH field value received in incoming signaling.

NOTE: The STI-AS must be invoked after originating call processing.

8. The STI-AS in the Originating Service Provider (i.e., Service Provider A) network determines through service provider-specific means the legitimacy of the content of the caller identity and the RPH field (i.e., the value in the “esnet” namespace) sent to it in the HTTP signingRequest. The STI-AS then securely requests its private key from the SKS.

9. The SKS provides the private key in the response, and the STI-AS signs and populates an identityHeader parameter as a JSON object in each signingResponse per 3GPP TS 24.229 [Ref 2].

10. The STI-AS returns an HTTP 200 OK message that includes a signingResponse that contains the signed identityHeader field value for the caller identity and a signingResponse that contains the signed identityHeader field value for the RPH.

11. The exit IBCF uses the identityHeader parameters in the two signing responses to populate Identity headers in the SIP INVITE message, then routes the SIP INVITE (with the Identity headers) over the NNI using standard inter-domain routing resolution. The IBCF will remove the ‘verstat’ prior to sending the call to the Emergency Services Network.

NOTE: As an implementation option, the Originating Service Provider may determine, based on the capabilities of the target Emergency Services Network, what information related to caller identity and RPH authentication will be forwarded to the interconnected network.

12. Upon receiving the SIP INVITE, the entry IBCF in the NG9-1-1 Emergency Services Network sends an HTTP POST containing a verificationRequest to the STI-VS. The verificationRequest includes an identityHeader claim for each Identity header received, as well as the “to” parameter containing the destination identity from the To header, the “from” parameter containing the asserted identity from the From or P-Asserted-Identity, and a “time” parameter based on the Date header field in the incoming SIP INVITE.

NOTE: The STI-VS must be invoked before terminating call processing.

13. The NG9-1-1 Emergency Services Network provider STI-VS determines the STI-CR Uniform Resource Identifier (URI) and makes an HTTPS request to the STI-CR as per ATIS-1000074-E [Ref 5].

14. The STI-VS validates the certificate and then extracts the public key as per ATIS-1000074-E [Ref 5]. It constructs the IETF RFC 8224 [Ref 13] format and uses the public key to verify the signature in the identityHeader fields, which validates the caller identity and RPH field signed by the originating service provider STI-AS.

15. The STI-VS may interact with the CVT based on local policy and agreements between the 9-1-1 Authority and the analytics/CVT provider.

[16.] The STI-VS returns a verificationResponse to the ingress entry IBCF. The verificationResponse includes “verstatValue” parameters that contain the results of the verification process associated with the signed caller identity and RPH. Depending on the results of the verification process, the “verstatValue” associated with the signed caller identity will be set to “TN-Validation-Passed”, “TN-Validation-Failed”, or “No-TN-Validation”, and the “verstatValue” associated with the signed RPH will

5 The HTTP interface used over the Ms interface needs to be enhanced to support the conveyance of the “rph” claim and associated assertion values.

13

581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632

910

Page 18: ATIS-0x0000x  · Web viewTechnical Specification Group Services and System Aspects; IP multimedia call control protocol based on Session Initiation Protocol (SIP) and Session Description

ATIS-10000XXbe provisionally set to “Emergency-Services-RPH-Validation-Passed”, “Emergency-Services-RPH-Validation-Failed”, or “No-Emergency-Services-RPH-Validation”. 6

NOTE: The value of the “verstatValue” parameter used to convey verification results associated with a signed RPH are provisional, pending final resolution in 3GPP. The means for signaling ‘verstat’ information associated with an RPH forward in the SIP INVITE message is for further study.

[17.] The ingress entry IBCF passes the SIP INVITE to the I- CSCF in the NG9-1-1 Emergency Services Network.

16.[18.] The I-CSCF passes the SIP INVITE to the pre-configured E-CSCF.17.[19.] The E-CSCF forwards the SIP INVITE to the LRF.18.[20.] The LRF queries the RDF using the location information received in the SIP INVITE message and

the emergency service Uniform Resource Name (urn:service:sos). The RDF returns a route URI. In this example, the route URI is associated with an i3 PSAP that is served by the NG9-1-1 Emergency Services Network.

19.[21.] The LRF redirects the call back to the E-CSCF, passing the Route (PSAP) URI.20.[22.] The E-CSCF generates an outgoing SIP INVITE message, using the information received from

the LRF, as well as information received in the initial SIP INVITE message, and forwards it to the (exit) IBCF.

21.[23.] The (exit) IBCF forwards the SIP INVITE to the i3 PSAP with the appropriate ’verstat’ values and Identity headers, and normal call processing associated with the emergency origination continues.

[5.4.2] SIP RPH and Priority Header Signing Call Flow for Callback CallsThis call flow description is based on the reference architecture illustrated in Figure 5-2.

Figure 5-4: Callback Call SIP RPH Signing Call Flow

[1.] The PSAP Call Handling Function initiates a callback call with the callback URI derived from the original emergency call in the To header and Request-URI, the TN of the PSAP originating the callback (i.e., sip:TN@<psapdomain>;user=phone) in the From and P-Asserted-Identity headers, “psap-callback” in the Priority header, and “esnet.0” in the Resource-Priority header.

1.[2.] Upon receiving the SIP INVITE from the PSAP, the entry IBCF applies general screening rules to the request and, based on local policy, adds an Origination-Id header to the SIP INVITE to indicate from where the request was received. It then forwards the SIP INVITE to the Transit Function.

2.[3.] The Transit Function uses the destination address (i.e., the callback URI) in the Request-URI to determine the routing for the call. Before forwarding the call to the interconnecting network, the Transit Function sends the request to the STI-AS for authentication and signing of the caller identity and signing of the RPH and Priority header.

NOTE: The STI-AS must be invoked after originating call processing (i.e., after the Transit Function determines that the interconnected network over which the call will be routed is an IP network).

6 Enhancements will need to be made to the verificationResponse message to carry a “verstatValue” parameter associated with RPH signing.

14

633634635636637638639640641642643644645646647648649650651652653

654

655

656

657658

659

660661662663664665666667668669670671672

1112

Page 19: ATIS-0x0000x  · Web viewTechnical Specification Group Services and System Aspects; IP multimedia call control protocol based on Session Initiation Protocol (SIP) and Session Description

ATIS-10000XX

3.[4.] The STI-AS determines, through service provider-specific means, the legitimacy of the content of the caller identity and the RPH and SIP Priority header fields. The STI-AS then securely requests its private key from the SKS.

4.[5.] The SKS provides the private key in the response, and the STI-AS signs and adds Identity header fields per IETF RFC 8224 [Ref 13].

5.[6.] The STI-AS returns the SIP INVITE which includes a signed Identity header field value for the caller identity and signed Identity header field values for the RPH and SIP Priority header in JSON objects.

[7.] The Transit Function routes the SIP INVITE (with the Identity headers) over the NNI using standard inter-domain routing resolution to the egress IBCF. The Transit Function routes the SIP INVITE (with the Identity headers) to the exit IBCF using standard inter-domain routing resolution. If, based on local policy, a ‘verstat’ is present in the SIP INVITE received by the Transit Function, the IBCF will remove the ‘verstat’ before forwarding the call to the next network.

[8.] In this example, the egressexit IBCF forwards the SIP INVITE to the entry IBCF in the emergency caller’s home network. Note that, depending on the scenario, the callback call may traverse other interconnecting networks.

6.[9.] The emergency caller’s home service provider’s (Service Provider A) entry IBCF initiates a verificationRequest to the STI-VS that includes an identityHeader parameter associated with the caller identity and an identityHeader parameter associated with the RPH/SIP Priority header.

NOTE: The STI-VS must be invoked before terminating call processing.

7.[10.] The emergency caller’s home service provider STI-VS uses the “x5u” field in the PASSporT Protected Header per IETF RFC 8225 [Ref 14] to determine the STI-CR Uniform Resource Identifier (URI) and makes an HTTPS request to the STI-CR.

8.[11.] The STI-VS validates the certificate and then extracts the public key as per ATIS-1000074-E [Ref 5]. It constructs the IETF RFC 8224 [Ref 13] format and uses the public key to verify the signature in the Identity header fields, which validates the caller identity and the RPH and SIP Priority header field content used when the caller identity and RPH/SIP Priority header content were signed by the STI-AS.

9.[12.] The STI-VS may interact with the CVT based on local policy and agreements between the emergency caller’s home service provider and the analytics/CVT provider.

10.[13.] Depending on the result of verification, the STI-VS includes an appropriate indicator of the verification result (not defined in this document) and returns a verificationResponse containing verstatValue parameters to the entry IBCF. The “verstatValue” associated with the signed caller identity will be set to “TN-Validation-Passed”, “TN-Validation-Failed”, or “No-TN-Validation”, and the “verstatValue” associated with the signed RPH/SIP Priority header will provisionally be set to “Emergency-Services-RPH-Priority-Header-Validation-Passed”, “Emergency-Services-RPH-Priority-Header-Validation-Failed”, or “No-Emergency-Services-RPH-Priority-Header-Validation”.7

NOTE: The value of the “verstatValue” parameter used to convey verification results associated with a signed RPH/SIP Priority header are provisional, pending final resolution in 3GPP. The means for signaling the ‘verstat’ information associated with the RPH/SIP Priority header in the SIP INVITE message, is for further study.

11.[14.] The IBCF continues to set up the callback call to the CSCF.12.[15.] The CSCF continues to set up the callback call toward the emergency caller.13.[16.] The terminating SIP UA receives the SIP INVITE and normal SIP processing of the call

continues, returning “200 OK” or optionally setting up media end-to-end.

6 Procedures for SIP RPH and Priority Header AuthenticationThis clause will detail the procedures at key elements in the architecture that play a role in asserting, signing and verifying the information in the SIP RPH and Priority header fields in the context of emergency calling.

7 Enhancements will need to be made to the verificationResponse message to carry an additional “verstatValue” parameter associated with RPH/SIP Priority header signing.

15

673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720

721

722723

1314

Perspecta user, 04/08/21,
Suggestion: “The CSCF strips the RPH header and forwards the SIP INVITE to the emergency caller.”
Perspecta user, 04/08/21,
Suggestion: “The IBCF receives the response from the STI-VS, decides what to do based on local policy, sets the verstat in the SIP message, etc. and forwards the SIP INVITE.”
Perspecta user, 04/08/21,
Why not give the 3GPP reference? [Ref 2]?
Page 20: ATIS-0x0000x  · Web viewTechnical Specification Group Services and System Aspects; IP multimedia call control protocol based on Session Initiation Protocol (SIP) and Session Description

ATIS-10000XX

6.1 Procedures at the IBCFThe IBCF shall adhere to Clauses 4 and 5.10 in 3GPP TS 24.229 [Ref 2] with additions as noted below. For emergency originations, an IBCF will be the exit point from the Originating Service Provider network and the entry point to an IMS NG9-1-1 Emergency Services Network. For emergency originations, there will also be an exit point IBCF between the NG9-1-1 Emergency Services Network and the PSAP. For callback calls, there will be an IBCF at the entry point of the IMS NG9-1-1 Emergency Services Network facing the PSAP and an IBCF that will be the exit point from the NG9-1-1 Emergency Services Network to the interconnected network. There will also be an IBCF at the entry point into an interconnected network.

6.1.1 Entry Point IBCFFor emergency (9-1-1) originations, the entry point IBCF associated with the NG9-1-1 Emergency Services Network will perform normal border control functions. As described in cClause 5.10.10.2 of 3GPP TS 24.229 [Ref 2], when receiving an initial SIP INVITE containing one or more SIP Identity header fields, the IBCF shall determine the caller identity to be verified by decoding the Identity header field containing a PASSporT SHAKEN JSON Web Token. While not yet addressed in 3GPP TS 24.229 [Ref 2], the IBCF shall also determine the RPH value to be verified by decoding the Identity header associated with the signed RPH. The IBCF will then build and send a verificationRequest to the STI-VS, assuming via the Ms reference point. Upon receiving a verificationResponse with a “verstatValue” parameter reflecting the verification status of the Identity header associated with calling identity, the IBCF will add this parameter to the verified identity in the SIP From header field or the SIP P-Asserted-Identity header field in the forwarded SIP request. If a ‘verstat’ parameter is already present in the From or P-Asserted-Identity header of the received SIP INVITE, the entry IBCF must remove it. The entry IBCF will also populate the ‘verstat’ value associated with the RPH in the outgoing SIP INVITE, based on the associated verstatValue returned in the verificationResponse. How the “verstatValue” reflecting the verification status of the Identity header associated with the signed RPH is populated in the outgoing SIP INVITE is for further study.

As the first active SIP element in an NG9-1-1 Emergency Services Network in the path of an emergency call, the entry IBCF must add the Call Identifier, Incident Tracking Identifier, and a Resource-Priority header set to “esnet.1” (if not already present) to the SIP INVITE associated with the emergency call. The entry point IBCF will ensure that the Resource Priority Header is set to “esnet.1” to indicate an emergency call. See ATIS-0500032 [Ref 3] for further details. The entry IBCF forwards the SIP INVITE to the I-CSCF.

For callback calls, the entry point IBCF in the NG9-1-1 Emergency Service Network (i.e., the IBCF facing the PSAP) will perform normal border control functions, and once the message is validated, it will forward the SIP INVITE to the Transit Function. If the SIP INVITE received by the entry point IBCF contains a ‘verstat’ parameter in the From or P-Asserted-Identity header, the entry IBCF must remove it. As the first active SIP element in an NG9-1-1 Emergency Services Network in the path of a callback call, the IBCF must add a Resource-Priority header set to “esnet.0” (if not already present) to the SIP INVITE associated with the callback call. Based on local policy, the entry point IBCF may also add an Origination-Id header to the SIP INVITE, indicating from where the request was received.

For callback calls, the entry point IBCF in the interconnected network (i.e., the Service Provider network interconnected to the NG9-1-1 Emergency Services Network via the IP NNI) will perform normal border control functions, and once the message is validated, it will forward the SIP INVITE based on normal routing procedures.

Also for callback calls, based on local policy, the entry point IBCF in the emergency caller’s home network may build and send a verificationRequest to the STI-VS, assuming via the Ms reference point. Upon receiving a verificationResponse with a “verstatValue” parameter reflecting the verification status of the Identity header associated with calling identity, the IBCF will add this the “verstatValue” parameter to the verified identity in the SIP From header field or the SIP P-Asserted-Identity header field in the forwarded SIP request. The entry IBCF will also populate the ‘verstat’ value associated with the signed RPH/SIP Priority header in the forwarded SIP request, based on the associated “verstatValue” parameter returned in the verificationResponse. How the verification status of the Identity header associated with the signed RPH/SIP Priority header is populated in the outgoing SIP INVITE is for further study.

16

724

725726727728729730731732

733

734735736737738739740741742743744745746747748749

750751752753754

755756757758759760761762

763764765

766767768769770771772773774

775

Perspecta user, 04/08/21,
How does it validate? By checking the caller id by implementation specific means? Clarify how it validates, since Caller ID and RPH have not yet been signed.
Page 21: ATIS-0x0000x  · Web viewTechnical Specification Group Services and System Aspects; IP multimedia call control protocol based on Session Initiation Protocol (SIP) and Session Description

ATIS-10000XX

[6.1.2] Exit Point IBCFFor an emergency (9-1-1) origination, the exit point IBCF in the Originating Service Provider network can interact with an STI-AS via the Ms reference point for the signing of caller identity and RPH information, if available in an incoming request. Specifically, the exit point IBCF sends an HTTP POST containing two signing requests over the Ms reference point to the STI-AS. The signingRequest associated with the caller identity will include an “attest” parameter that contains the attestation information and an “origid” populated based on local policy or received by the IBCF in Attestation-Info and Origination-Id headers, respectively, as well as other PASSporT information (i.e., “orig”, “dest”, and “iat”). The signingRequest associated with the RPH will include an “rph” claim as described in [IETF RFC 8443] that contains an “auth” key and assertion value of “esnet.1”, as described in draft-ietf-stir-rph-emergency-services-07 [Ref 7], along with the “orig”, “dest”, and “iat”. The exit IBCF will populate the assertion value in the signingRequest based on the RPH field in the received SIP INVITE. The exit point IBCF includes the signed Identity headers received in the HTTP signing responses in the outgoing request. The exit point IBCF must remove the ‘verstat’, if any, from the From header or P-Asserted-Identity header prior to sending the SIP INVITE over the IP NNI to the Emergency Services Network. As described in Clause 5.4.1, the Originating Service Provider may, as an implementation option, determine what other information related to caller identity and RPH authentication will be forwarded to the interconnected network, based on the capabilities of the target Emergency Services Network.

For an emergency (9-1-1) origination, the exit point IBCF in the NG9-1-1 Emergency Services Network shall use the Route header to determine where to forward the SIP INVITE (e.g., to the i3 PSAP). The IBCF shall pass all headers and message bodies unless passing of the parameters is prohibited by its role as a border gateway function.

For callback calls, if the NG9-1-1 Emergency Services Network supports caller identity authentication and RPH and SIP Priority header signing, the exit IBCF may, based on local policy, be responsible for interacting with an STI-AS. If so, the exit point IBCF will send an HTTP POST containing two signing requests, assuming via the Ms reference point to, the STI-AS. The signingRequest associated with the caller identity will include an “attest” parameter that contains the attestation information and an “origid” populated based on local policy or received by the IBCF in Attestation-Info and Origination-Id headers, respectively, as well as other PASSporT information (i.e., “orig”, “dest”, and “iat”). The signingRequest associated with the RPH/Priority header will include an “rph” claim that contains an “auth” key and assertion value of “esnet.0” and a “sph” claim set to “psap-callback”, as described in draft-ietf-stir-rph-emergency-services-07 [Ref 7], along with an “orig”, “dest”, and “iat”. The exit IBCF will use the identityHeader parameters received in the signing responses from the STI-AS to populate Identity headers in the outgoing SIP INVITE associated with the callback call.

In support of callback calls, the exit point IBCF in the NG9-1-1 Emergency Services Network shall use the Route header to determine the well-known URI associated with the interconnected network. The IBCF shall pass all headers and message bodies unless passing of the parameters is prohibited by its role as a border gateway function.

6.2 Procedures at the STI-ASIn the context of emergency (9-1-1) originations, the STI-AS, assuming the Ms reference point, will receive an HTTP POST from the IBCF that includes a signingRequest that contains a SHAKEN PASSporT (i.e., ”attest”, “dest”, “iat”, “orig”, “origid”), as well as a signing request that contains an “rph” claim. The STI-AS determines through service provider-specific means the legitimacy of the content of the caller identity and the “rph” claim (i.e., the value in the “esnet” namespace), then securely requests its private key from the SKS. Upon receiving the private key from the SKS, the STI-AS signs and returns to the IBCF an identityHeader field value for the caller identity and an identityHeader field value for the RPH in JSON objects in signing responses within an HTTP 200 OK.

In the context of callback calls, the STI-AS may, based on local policy, receive SIP INVITE messages associated with callback calls from a Transit Function and will be responsible for determining, through service provider-specific means, the legitimacy of the caller identity, RPH, and SIP Priority header being used in the SIP INVITE. The STI-AS is then responsible for cryptographically signing the PASSporT and adding Identity header fields with signatures (corresponding the caller identity and RPH/SIP Priority header) to the SIP INVITE that it returns to the Transit Function. Alternatively, an STI-AS may, based on local policy and assuming the Ms reference point, receive an HTTP POST from an exit IBCF that includes a signingRequest containing SHAKEN PASSporT claims (i.e., ”attest”, “dest”, “iat”, “orig”, “origid”), as well as a signing request that contains an “rph” claim and an “sph”

17

776777778779780781782783784785786787788789790791792

793794795796

797798799800801802803804805806807

808809810811

812

813814815816817818819820821

822823824825826827828829

Page 22: ATIS-0x0000x  · Web viewTechnical Specification Group Services and System Aspects; IP multimedia call control protocol based on Session Initiation Protocol (SIP) and Session Description

ATIS-10000XXclaim. The STI-AS determines through service provider-specific means the legitimacy of the content of the caller identity and the “rph” and “sph” claims and securely requests its private key from the SKS. The STI-AS then signs and returns to the IBCF an identityHeader parameter for the caller identity and an identityHeader parameter for the RPH/Priority header as JSON objects in signing responses within an HTTP 200 OK.

6.3 Procedures at the STI-VSThe STI-VS is an application server that performs the function of the verification service defined in IETF RFC 8224 [Ref 13]. In the context emergency calling, the STI-VS provides verification services applicable to emergency calls destined for PSAPs that are served by an NG9-1-1 Emergency Services Network and callback calls destined for the emergency caller. The STI-VS can receive a verification request in one of two ways: by Assuming the Ms reference point, upon receiving an HTTP verificationRequest associated with an emergency (9-1-1) origination via the Ms reference point from an entry IBCF in the IMS NG9-1-1 Emergency Services Network (for emergency originations), or by receiving an HTTP verificationRequest or SIP INVITE from the emergency caller’s home network (for callback calls)., Tthe STI-VS retrieves the certificate referenced by the “x5u” field in the PASSporT protected header from the STI-CR, and. The STI-VS follows the basic certificate path processing as described in IETF RFC 5280, Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile [Ref 9], following the chain until the root is reached. The STI-VS ensures that the root certificate is on the list of trusted Secure Telephone Identity Certification Authorities (STI-CAs). The STI-VS validates that the PASSporT information provided in the Identity headers contained in the verificationRequest includes the SHAKEN claims and “rph” claim. The verifier shall also follow the IETF RFC 8224-defined [Ref 13] verification procedures defined in IETF RFC 8224 [Ref 13] to check the corresponding date, origination and destination identities, with the restrictions specified in ATIS-1000074-E [Ref 5]. The STI-VS will return “verstatValue” parameters in the HTTP verificationResponse or ‘verstat’ parameters in a SIP INVITE to convey the results of the verification. (See Clauses 5.4.1 and 5.4.2 for further details.) The STI-VS may include another appropriate indicator (not defined in this document) in the verificationResponse based on interactions with the CVT. The STI-VS must be invoked prior to terminating call processing associated with the emergency call.

6.4 Procedures at the P-CSCFA P-CSCF operating in an Originating Service Provider network that supports caller identity authentication and RPH signing may, based on local policy, be responsible for inserting attestation information related to the asserted caller identity and populating the RPH in a SIP INVITE associated with an emergency origination. According to 3GPP TS 24.229 [Ref 2], when a node performs attestation of an identity in an incoming request or can attest to the origin of the request, the node can inform a downstream node about what kind of attestation the node has performed. Based on local policy, if the P-CSCF is responsible for providing attestation information associated with the caller identity for an authenticated emergency call, the P-CSCF will insert a ‘verstat’ parameter in the P-Asserted-Identity header, an optional Attestation-Info header field in the SIP INVITE with a value of "A", "B" or "C", as defined in ATIS-1000074-E [Ref 5], associated with the caller identity, and an optional origination identifier (in the form of a Universally Unique Identifier) in an Origination-Id header field. The P-CSCF may also populate a value of “esnet.1” in the RPH.

6.5 Procedures at the Transit FunctionThe Transit Function is expected to adhere to the procedures described in Clauses 4.15.3 and 5.19 of 3GPP TS 23.228 [Ref 1] with the following clarifications.

When a PSAP initiates a callback call via an IMS NG9-1-1 Emergency Services Network, the Transit Function will be responsible for routing the callback call based on the destination address (i.e., the address associated with the emergency caller) received in incoming signaling. A Transit Function operating in an NG9-1-1 Emergency Services Network that supports caller identity authentication and RPH and SIP Priority header signing may, based on local policy, be responsible for interacting with an STI-AS to assert the telephone identity of the caller (i.e., the PSAP) and to request the signing of the RPH and SIP Priority header values prior to forwarding the callback request towards the succeeding network via an exit IBCF. The Transit Function will utilize a SIP interface to the STI-AS, passing along the SIP INVITE message that it received from the entry IBCF. The Transit Function will invoke the STI-AS for callback calls after call processing has completed, that is, after the Transit Function determines the interconnected network to which the call will be routed. Once the assertion and signing process is

18

830831832833

834

835836837838839840841842843844845846847848849850851852853854855

856

857858859860861862863864865866867868

869

870871872

873874875876877878879880881882

Perspecta user, 04/08/21,
If the P-CSCF is doing the signing for emergency calls, should this be a "shall"?
Perspecta user, 04/08/21,
Need a reference for this
Page 23: ATIS-0x0000x  · Web viewTechnical Specification Group Services and System Aspects; IP multimedia call control protocol based on Session Initiation Protocol (SIP) and Session Description

ATIS-10000XXcompleted, the Transit Function will receive the SIP INVITE back from the STI-AS with an added SIP Identity header field (associated with the caller identity) constructed per IETF RFC 8224 [Ref 13], using the IMS-based NG9-1-1 Emergency Services Network provider’s credentials as the signing authority for the PSAP telephone identity. The SIP INVITE returned by the STI-AS will also include an Identity header associated with the RPH/SIP Priority header. After receiving the SIP INVITE from the STI-AS, the Transit Function will route the call to the exit IBCF.

19

883884885886887888

889

890